9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.045 Low
EPSS
Percentile
91.5%
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.
A heap-based buffer overflow flaw was found in the way libtiff processed
certain TIFF Internet Fax image files, compressed with the CCITT Group 4
compression algorithm. An attacker could use this flaw to create a
specially-crafted TIFF file that, when opened, would cause an application
linked against libtiff to crash or, possibly, execute arbitrary code.
(CVE-2011-0192)
Red Hat would like to thank Apple Product Security for reporting this
issue.
All libtiff users should upgrade to these updated packages, which contain a
backported patch to resolve this issue. All running applications linked
against libtiff must be restarted for this update to take effect.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 4 | s390x | libtiff | < 3.6.1-17.el4 | libtiff-3.6.1-17.el4.s390x.rpm |
RedHat | 6 | i686 | libtiff-devel | < 3.9.4-1.el6_0.1 | libtiff-devel-3.9.4-1.el6_0.1.i686.rpm |
RedHat | 4 | ia64 | libtiff-devel | < 3.6.1-17.el4 | libtiff-devel-3.6.1-17.el4.ia64.rpm |
RedHat | 5 | ppc | libtiff | < 3.8.2-7.el5_6.6 | libtiff-3.8.2-7.el5_6.6.ppc.rpm |
RedHat | 4 | ppc | libtiff-devel | < 3.6.1-17.el4 | libtiff-devel-3.6.1-17.el4.ppc.rpm |
RedHat | 6 | ppc64 | libtiff | < 3.9.4-1.el6_0.1 | libtiff-3.9.4-1.el6_0.1.ppc64.rpm |
RedHat | 6 | x86_64 | libtiff-debuginfo | < 3.9.4-1.el6_0.1 | libtiff-debuginfo-3.9.4-1.el6_0.1.x86_64.rpm |
RedHat | 6 | x86_64 | libtiff | < 3.9.4-1.el6_0.1 | libtiff-3.9.4-1.el6_0.1.x86_64.rpm |
RedHat | 5 | i386 | libtiff | < 3.8.2-7.el5_6.6 | libtiff-3.8.2-7.el5_6.6.i386.rpm |
RedHat | 6 | src | libtiff | < 3.9.4-1.el6_0.1 | libtiff-3.9.4-1.el6_0.1.src.rpm |